Open hats-bug-reporter[bot] opened 5 months ago
Github username: -- Twitter username: -- Submission hash (on-chain): 0xdae446b784acccf3b7cc39e5d44f49cfd6afba0226f93aa6b1f18a6eebc06f37 Severity: medium
Description: Description\ Due to the different ways ERC20s are implemented some return a boolean OR some revert and don't return anything on success
Attack Scenario\ There can be a transaction that uses one of these differences in token return values to create a DOS attack.
Attachments
Proof of Concept (PoC) File https://docs.openzeppelin.com/contracts/5.x/api/token/erc20#SafeERC20
Revised Code File (Optional)
There's no information about a vulnerability here.
Github username: -- Twitter username: -- Submission hash (on-chain): 0xdae446b784acccf3b7cc39e5d44f49cfd6afba0226f93aa6b1f18a6eebc06f37 Severity: medium
Description: Description\ Due to the different ways ERC20s are implemented some return a boolean OR some revert and don't return anything on success
Attack Scenario\ There can be a transaction that uses one of these differences in token return values to create a DOS attack.
Attachments
Proof of Concept (PoC) File https://docs.openzeppelin.com/contracts/5.x/api/token/erc20#SafeERC20
Revised Code File (Optional)